Patents by Inventor William Patton
William Patton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240153092Abstract: In one embodiment, a method includes accessing, by a computing device, a thermal image of a space within a cooking apparatus, wherein the space contains a food item. The method further includes segmenting, by a computing device and based on the thermal image, the food item in the space from the food item's environment.Type: ApplicationFiled: November 8, 2022Publication date: May 9, 2024Inventors: Pedro Martinez Lopez, Brian Patton, Nigel Clarke, William Augustus Workman, Megan Rowe
-
Patent number: 11847579Abstract: Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users. A learning management system (LMS), configured to be SCORM-compliant, initiates shareable content object (SCO) to provide content to users. The LMS implements an instance of application programming interface (API) comprising a plurality of functions to be called by SCO during runtime to access data model elements accessible via LMS. The LMS is configured to support one or more data model elements undefined by SCORM. Further, LMS receives a call to a function of the plurality of functions of the API from SCO to access information about users. The call references a name of a data model element undefined by SCORM. The data model element identifies information about users. The LMS provides information about the users to SCO and the SCO tailors the content to the users based on the information.Type: GrantFiled: March 6, 2023Date of Patent: December 19, 2023Assignee: KnowBe4, Inc.Inventors: Carl Kritzinger, Francisco Barreto, Mark William Patton
-
Patent number: 11729206Abstract: Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users. One or more email accounts of the email system with the security system may be identified to use for a delivery verification campaign. Further, one or more types of simulated phishing communications may be selected from a plurality of types of simulated phishing communications. The delivery verification campaign may be configured to include the selection of the one or more types of simulated phishing communications from the plurality of types of simulated phishing communications. The selected one or more types of simulated phishing communications of the delivery verification campaign may be communicated to the one or more email accounts. Further, whether or not each of the one or more types of simulated phishing communications was allowed by the security system to be received unchanged at the one or more email accounts.Type: GrantFiled: January 9, 2023Date of Patent: August 15, 2023Assignee: KnowBe4, Inc.Inventors: Mark William Patton, Daniel Cormier, Greg Kras
-
Publication number: 20230214687Abstract: Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users. A learning management system (LMS), configured to be SCORM-compliant, initiates shareable content object (SCO) to provide content to users. The LMS implements an instance of application programming interface (API) comprising a plurality of functions to be called by SCO during runtime to access data model elements accessible via LMS. The LMS is configured to support one or more data model elements undefined by SCORM. Further, LMS receives a call to a function of the plurality of functions of the API from SCO to access information about users. The call references a name of a data model element undefined by SCORM. The data model element identifies information about users. The LMS provides information about the users to SCO and the SCO tailors the content to the users based on the information.Type: ApplicationFiled: March 6, 2023Publication date: July 6, 2023Applicant: KnowBe4, Inc.Inventors: Carl Kritzinger, Francisco Barreto, Mark William Patton
-
Patent number: 11599810Abstract: Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users. A learning management system (LMS), configured to be SCORM-compliant, initiates shareable content object (SCO) to provide content to users. The LMS implements an instance of application programming interface (API) comprising a plurality of functions to be called by SCO during runtime to access data model elements accessible via LMS. The LMS is configured to support one or more data model elements undefined by SCORM. Further, LMS receives a call to a function of the plurality of functions of the API from SCO to access information about users. The call references a name of a data model element undefined by SCORM. The data model element identifies information about users. The LMS provides information about the users to SCO and the SCO tailors the content to the users based on the information.Type: GrantFiled: February 23, 2021Date of Patent: March 7, 2023Assignee: KnowBe4, Inc.Inventors: Carl Kritzinger, Francisco Barreto, Mark William Patton
-
Publication number: 20230038258Abstract: Systems and methods are disclosed for analysis of user behavior data to improve security awareness. User behavior data of an organization is received from one or more agents on endpoint devices accessed by the users and using the user behavior data, one or more risk scores representative of the severity of risk associated with the user behavior of the users are determined. Based on the one or more risk scores representative of the severity of risk associated with the user behavior of the users, the behavior of the is determined to pose a security risk to the organization, In response to the determination that the user behavior of the users of the organization poses a security risk to the organization, electronic security awareness training is delivered to the users.Type: ApplicationFiled: July 28, 2022Publication date: February 9, 2023Applicant: KnowBe4, Inc.Inventor: Mark William Patton
-
Patent number: 11552982Abstract: Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users. One or more email accounts of the email system with the security system may be identified to use for a delivery verification campaign. Further, one or more types of simulated phishing communications may be selected from a plurality of types of simulated phishing communications. The delivery verification campaign may be configured to include the selection of the one or more types of simulated phishing communications from the plurality of types of simulated phishing communications. The selected one or more types of simulated phishing communications of the delivery verification campaign may be communicated to the one or more email accounts. Further, whether or not each of the one or more types of simulated phishing communications was allowed by the security system to be received unchanged at the one or more email accounts.Type: GrantFiled: August 24, 2020Date of Patent: January 10, 2023Assignee: KnowBe4, Inc.Inventors: Mark William Patton, Daniel Cormier, Greg Kras
-
Publication number: 20220166784Abstract: Systems and methods are described for identifying other instances of messages corresponding to a reported malicious message. A report of a malicious message from a user of a plurality users using a messaging system is received. Responsive to the report of the malicious message, plain text of content selected from the malicious message is provided. Thereafter, one or more segments of the plain text are selected as key content for construction of a search. A search is then executed in the messaging system for one or more other malicious messages corresponding to the reported malicious message using the selected one or more segments of the plain text with one or more match criteria or no criteria. The one or more other malicious messages corresponding to the reported malicious message are identified in the messaging system.Type: ApplicationFiled: November 17, 2021Publication date: May 26, 2022Applicant: KnowBe4, Inc.Inventors: Mark William Patton, Steffan Perry, Amanda Lewis
-
Publication number: 20220067552Abstract: Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users. A learning management system (LMS), configured to be SCORM-compliant, initiates shareable content object (SCO) to provide content to users. The LMS implements an instance of application programming interface (API) comprising a plurality of functions to be called by SCO during runtime to access data model elements accessible via LMS. The LMS is configured to support one or more data model elements undefined by SCORM. Further, LMS receives a call to a function of the plurality of functions of the API from SCO to access information about users. The call references a name of a data model element undefined by SCORM. The data model element identifies information about users. The LMS provides information about the users to SCO and the SCO tailors the content to the users based on the information.Type: ApplicationFiled: February 23, 2021Publication date: March 3, 2022Inventors: Carl Kritzinger, Francisco Barreto, Mark William Patton
-
Publication number: 20220060495Abstract: Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users. One or more email accounts of the email system with the security system may be identified to use for a delivery verification campaign. Further, one or more types of simulated phishing communications may be selected from a plurality of types of simulated phishing communications. The delivery verification campaign may be configured to include the selection of the one or more types of simulated phishing communications from the plurality of types of simulated phishing communications. The selected one or more types of simulated phishing communications of the delivery verification campaign may be communicated to the one or more email accounts. Further, whether or not each of the one or more types of simulated phishing communications was allowed by the security system to be received unchanged at the one or more email accounts.Type: ApplicationFiled: August 24, 2020Publication date: February 24, 2022Inventors: Mark William Patton, Daniel Cormier, Greg Kras
-
Patent number: 11038914Abstract: Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users. The delivery verification campaign may be configured to include the selection of the one or more types of simulated phishing communications from the plurality of types of simulated phishing communications. The selected one or more types of simulated phishing communications of the delivery verification campaign may be communicated to one or more email accounts. It is determined whether or not each of the one or more types of simulated phishing communications was allowed by the security system to be received unchanged at the one or more email accounts.Type: GrantFiled: February 15, 2021Date of Patent: June 15, 2021Assignee: KnowBe4, Inc.Inventors: Mark William Patton, Daniel Cormier, Greg Kras
-
Patent number: 10949760Abstract: Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users. A learning management system (LMS), configured to be SCORM-compliant, initiates shareable content object (SCO) to provide content to users. The LMS implements an instance of application programming interface (API) comprising a plurality of functions to be called by SCO during runtime to access data model elements accessible via LMS. The LMS is configured to support one or more data model elements undefined by SCORM. Further, LMS receives a call to a function of the plurality of functions of the API from SCO to access information about users. The call references a name of a data model element undefined by SCORM. The data model element identifies information about users. The LMS provides information about the users to SCO and the SCO tailors the content to the users based on the information.Type: GrantFiled: August 28, 2020Date of Patent: March 16, 2021Assignee: KnowBe4, Inc.Inventors: Carl Kritzinger, Francisco Barreto, Mark William Patton
-
Patent number: 10917429Abstract: Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users. The delivery verification campaign may be configured to include the selection of the one or more types of simulated phishing communications from the plurality of types of simulated phishing communications. The selected one or more types of simulated phishing communications of the delivery verification campaign may be communicated to one or more email accounts. It is determined whether or not each of the one or more types of simulated phishing communications was allowed by the security system to be received unchanged at the one or more email accounts.Type: GrantFiled: August 25, 2020Date of Patent: February 9, 2021Assignee: KnowBe4, Inc.Inventors: Mark William Patton, Daniel Cormier, Greg Kras
-
Patent number: 10257232Abstract: An endpoint security agent facilitates a security policy on an endpoint computing device. The endpoint agent comprises an engine and one or more plugins that each provide a particular security feature. The endpoint agent receives a policy from a cloud server specifying one or more plug-ins used by the policy and configuration of those plug-ins. The endpoint agent retrieves, installs, and configures the one or more plugins. The endpoint agent updates a communication table with command subscription information obtained from each installed plugin indicating command types subscribed to by each plug-in. When a command is received, a lookup of the command type is performed in the table, and the command is sent to the subscribing plugin.Type: GrantFiled: September 13, 2017Date of Patent: April 9, 2019Assignee: Malwarebytes Inc.Inventors: Kevin Douglas Breton, Mark William Patton
-
Patent number: 10250623Abstract: A security server tracks malicious objects detected by malware detection applications that scan for malicious objects on clients. The security server also receives client information from the clients indicating client states. The client state describes one or more protection applications executing on the client that seek to identify and prevent malicious objects from taking malicious actions based on real-time monitoring. Thus, the security server may identify when the protection application fails to detect a malicious object. In addition, the security server maps detection events of malicious objects with corresponding client states to generate aggregate detection information for a population of clients. Analytical data can be derived from the aggregate detection information to identify trends useful for evaluating different types of protection applications.Type: GrantFiled: December 11, 2017Date of Patent: April 2, 2019Assignee: Malwarebytes, Inc.Inventors: Mark William Patton, Darren Kazuo Chinen, Braydon Michael Davis, Ragesh Damodaran, Manikandan Vellore Muneeswaran, Vijay Arumugam Velayutham
-
Publication number: 20190081982Abstract: An endpoint security agent facilitates a security policy on an endpoint computing device. The endpoint agent comprises an engine and one or more plugins that each provide a particular security feature. The endpoint agent receives a policy from a cloud server specifying one or more plug-ins used by the policy and configuration of those plug-ins. The endpoint agent retrieves, installs, and configures the one or more plugins. The endpoint agent updates a communication table with command subscription information obtained from each installed plugin indicating command types subscribed to by each plug-in. When a command is received, a lookup of the command type is performed in the table, and the command is sent to the subscribing plugin.Type: ApplicationFiled: September 13, 2017Publication date: March 14, 2019Inventors: Kevin Douglas Breton, Mark William Patton
-
Patent number: 10229269Abstract: An anti-malware application detects and remediates ransomware. The anti-malware application monitors processes executing on a computing device and detects that a process is opening a file for editing. A portion of the original file is saved prior to being edited by the process. Once the edited file is saved, the anti-malware application compares a portion of the edited file to the portion of the original file to determine if the edited file is encrypted. The anti-malware application may determine the process is associated with ransomware based on whether the edited file is encrypted.Type: GrantFiled: February 13, 2018Date of Patent: March 12, 2019Assignee: Malwarebytes Inc.Inventors: Mark William Patton, Zohiartze Herce San Martín, Jorge Alejandro Duran Royo, Sherab Giovannini
-
Patent number: 10193918Abstract: An anti-malware application analyzes behavior of an executing process to identify ransomware. The anti-malware application detects an untrusted process requesting enumeration of a directory of user files and causes the untrusted process to initially operate on a decoy file that mimics the user files. If the behavior of the untrusted process with respect to the decoy file is indicative of ransomware, the process can be terminated without loss of the user files. The decoy file may be deployed in a way that is undetectable to the user.Type: GrantFiled: March 28, 2018Date of Patent: January 29, 2019Assignee: Malwarebytes Inc.Inventors: Mark William Patton, Nathan Scott, Ramon Royo Gutierrez, Sherab Giovannini
-
Publication number: 20180211040Abstract: An anti-malware application detects, stops, and quarantines ransomware. The anti-malware application monitors threads executing on a computing device and detects behaviors that conform to a predefined set of behaviors indicative of ransomware. Responsive to detecting these behaviors, indicators are stored to a log in a storage device. Each of the indicators in the log is associated with respective scores. A running score for each thread is generated by combining the respective scores of the indicators in the log. Responsive to determining that the running score exceeds a predefined threshold score, execution of the thread is terminated. The source ransomware file is then identified and quarantined.Type: ApplicationFiled: July 5, 2017Publication date: July 26, 2018Inventors: Mark William Patton, Ares Lopez Ituiño
-
Patent number: 10032025Abstract: An anti-malware application detects, stops, and quarantines ransomware. The anti-malware application monitors threads executing on a computing device and detects behaviors that conform to a predefined set of behaviors indicative of ransomware. Responsive to detecting these behaviors, indicators are stored to a log in a storage device. Each of the indicators in the log is associated with respective scores. A running score for each thread is generated by combining the respective scores of the indicators in the log. Responsive to determining that the running score exceeds a predefined threshold score, execution of the thread is terminated. The source ransomware file is then identified and quarantined.Type: GrantFiled: July 5, 2017Date of Patent: July 24, 2018Assignee: Malwarebytes Inc.Inventors: Mark William Patton, Ares Lopez Ituiño